File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/LCN.2005.70
- Scopus: eid_2-s2.0-33751424902
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Filtering of shrew DDoS attacks in frequency domain
Title | Filtering of shrew DDoS attacks in frequency domain |
---|---|
Authors | |
Keywords | Digital signal processing (DSP) Distributed denial of service (DDoS) Internet traffic analysis Network security Reduction of quality (RoQ) |
Issue Date | 2005 |
Publisher | IEEE, Computer Society. The Journal's web site is located at http://www.ieee.org |
Citation | Proceedings - Conference On Local Computer Networks, Lcn, 2005, v. 2005, p. 786-793 How to Cite? |
Abstract | The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, In order to minimize the huge monetary losses, there is a pressing need to effectively detect such attacks in real-time. Unfortunately, effective detection of shrew attacks remains an open problem. In this paper, we meet this challenge by proposing a new signal processing approach to identifying and detecting the attacks by examining the frequency-domain characteristics of incoming traffic flows to a server. A major strength of our proposed technique is that its detection time is less than a few seconds. Furthermore, the technique entails simple software or hardware implementations, making it easily deployable in a real-life network environment. © 2005 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/45910 |
ISSN | 2019 SCImago Journal Rankings: 0.125 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Y | en_HK |
dc.contributor.author | Hwang, K | en_HK |
dc.contributor.author | Kwok, YK | en_HK |
dc.date.accessioned | 2007-10-30T06:38:18Z | - |
dc.date.available | 2007-10-30T06:38:18Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | Proceedings - Conference On Local Computer Networks, Lcn, 2005, v. 2005, p. 786-793 | en_HK |
dc.identifier.issn | 0742-1303 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/45910 | - |
dc.description.abstract | The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, In order to minimize the huge monetary losses, there is a pressing need to effectively detect such attacks in real-time. Unfortunately, effective detection of shrew attacks remains an open problem. In this paper, we meet this challenge by proposing a new signal processing approach to identifying and detecting the attacks by examining the frequency-domain characteristics of incoming traffic flows to a server. A major strength of our proposed technique is that its detection time is less than a few seconds. Furthermore, the technique entails simple software or hardware implementations, making it easily deployable in a real-life network environment. © 2005 IEEE. | en_HK |
dc.format.extent | 474863 bytes | - |
dc.format.extent | 3564 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | text/plain | - |
dc.language | eng | en_HK |
dc.publisher | IEEE, Computer Society. The Journal's web site is located at http://www.ieee.org | en_HK |
dc.relation.ispartof | Proceedings - Conference on Local Computer Networks, LCN | en_HK |
dc.rights | ©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Digital signal processing (DSP) | en_HK |
dc.subject | Distributed denial of service (DDoS) | en_HK |
dc.subject | Internet traffic analysis | en_HK |
dc.subject | Network security | en_HK |
dc.subject | Reduction of quality (RoQ) | en_HK |
dc.title | Filtering of shrew DDoS attacks in frequency domain | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0742-1303&volume=&spage=785&epage=793&date=2005&atitle=Filtering+of+shrew+DDoS+attacks+in+frequency+domain | en_HK |
dc.identifier.email | Kwok, YK:ykwok@eee.hku.hk | en_HK |
dc.identifier.authority | Kwok, YK=rp00128 | en_HK |
dc.description.nature | published_or_final_version | en_HK |
dc.identifier.doi | 10.1109/LCN.2005.70 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33751424902 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33751424902&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 2005 | en_HK |
dc.identifier.spage | 786 | en_HK |
dc.identifier.epage | 793 | en_HK |
dc.identifier.scopusauthorid | Chen, Y=7601429477 | en_HK |
dc.identifier.scopusauthorid | Hwang, K=7402426691 | en_HK |
dc.identifier.scopusauthorid | Kwok, YK=7101857718 | en_HK |
dc.identifier.issnl | 0742-1303 | - |